The HydraNFC is a NFC shield hardware to sniff, read/write or emulate any 13.56MHz NFC tags (with the help of direct modes) for anyone interested in debugging/hacking/developing for NFC.

It has been designed to be used with HydraBus but can also be used with other MCU (breakout of all TRF7970A I/O).

HydraNFC is as powerful as Proxmark3 hardware (when combined with HydraBus) but smaller, autonomous, more extensible and without requiring an FPGA (all is done in CortexM4 MCU with the help of HydraBus with ultra fast unique algorithm to sniff & decode in real-time PICC/PCD NFC cards).

Usage of ChibiOS (OS+Drivers) and microrl for VT100 terminal with history, completion and lot of other cool features

•Basic UID read for Vicinity/ISO15693 (through shell command)

•Basic UID read for Mifare One card (through shell command)

•Sniffer mode (NFC protocol analyzer) in autonomous mode for ISO14443A including both PICC and PCD with data logged to microSD card (tested with success with Mifare One NFC).

Sniffer is synchronized with TRF7970A CLK OUT (13.56MHz/4), use DMA double buffer to retrieve in real-time NFC raw bitstream, synchronize and detect (Tag/PICC=miller modified or PCD=manchester) protocol, decode it and format it in ASCII in less than 1us per bit, when user press a button the data are stored in microSD card (data can be also displayed in Terminal).

Example of sniffed output with a Mifare One tag read by a Nexus S phone: